cyse476 ece476 cryptography fundamentals project 1b breaking historica
Search for question
Question
CYSE476/ECE476
CRYPTOGRAPHY FUNDAMENTALS
Project 1b: Breaking Historical Ciphers
Due Date: Saturday, February 17th, 2024, 11:59pm
Reading Assignment:
● C. Paar and J. Pelzl, Understanding Cryptography, Chapter 1
• W. Stallings, Cryptography and Network Security 8th edition, Chapter 3
SPRING 2024
● A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, Chapter
7.3
• CrypTool - Online Help
Help → Starting page → Functionality of CrypTool → Document encryption → Sym-
metric (classic)
Help → Starting page → Functionality of CrypTool → Analyzing Documents → Tools
for Analysis and Symmetric Encryption (classic)
1
Installation
In order to complete this lab you might want to install CrypTool on your personal computer/laptop.
You can download CrypTool from https://www.cryptool.org.
The recommended version of software is CrypTool 1 (CT1) ver. 1.4.42 - English.
2 Breaking the Affine Cipher
Task 4 (20 points)
Below please find a ciphertext obtained by encrypting a message in English using the Affine cipher.
Please note that spaces and punctuation characters have been removed before encryption. The
ciphertext has been divided into blocks of the size of 5 letters.
BXWCG JWHWS SBWHW OJMRX GSZIB NGFFG EKHBB IKZNW JSBMZ NBXWI JNGZM JUBWH WOJMR
XGSHG YWMTW JUHIZ OEMBU IKRKH HBXWB MGHGZ ZWCUI JYMZN GBQWI CSGZH ISMZO WHWSB
XWCGJ WHWSS GSBXW SMQWI ZHUCG BXIKB BXWEM B
Find the secret key used for encryption by breaking the Affine cipher analytically, using methods
discussed in Lecture 2. Use CrypTool to analyze the frequency of letters in the ciphertext and to
recover the plaintext. Your attack must be analytical and fully documented. Brute-force attacks
do not count.
1 CYSE476/ECE476
CRYPTOGRAPHY FUNDAMENTALS
SPRING 2024
3 Recognizing and Breaking Ciphers
Task 5 (35 points + bonus points)
Below please find ciphertexts of the same message encrypted using the following 6 classical
ciphers available CrypTool: Caesar, Vigenere, Hill, Substitution, Playfair, and Permutation.
Do your best to match ciphertexts with a cipher that could have been used to obtain the given
ciphertext.
Find the plaintext by breaking the Shift cipher, and then find the keys for at least 2 additional
ciphers used to encrypt the now known plaintext using a known-plaintext attack. You will ob-
tain extra points for any cipher broken in addition to the 3 required ones. All attacks must be
documented. Brute-force attacks do not count.
Please note that spaces and punctuation characters have been removed before encryption. The
ciphertext has been divided into blocks of the size of 5 letters.
1. Ciphertext
OEWHA DTIST BOGOH DABTE CETNW HTNEI STSWS DODNA FHUNT DLEAM SSYIM TNEHK NWNHG
SACEN CSSLG SITSM FSOHR CSEAE IREIO PCIIL LGOAO YUHTO SHGHE BSNNI NONDE LEDOA
EENTE DTEIN URTEY ETHGS AGEON YOROK STYOP CHOEU BWEEA EPW
2. Ciphertext
QKADJ QSADJ WVQWP KJBWC AJCAQ VDNBK NNKAQ JKSLH VYNDR ARKJQ DNAPV SDKJK MEHVR
GCKHA QQTBB AQSJK KJHYS CVSBK NNKAQ LHVYN DRAET SSCVS CAQKI ASDIA QRKJM TQAQT
QEYSC PKWDJ BSCAI WCAPA SCAYR VJSEA QAAJQ SALCA JCVWG DJB
3. Ciphertext
ONGDA OMUHA YOOVE NARXD RODRO BKHEA HWMDF OANLQ QSWIK DFDNA ACMOG NQKNA SESTS
ICISM FOBFR YURBL ANNAQ VPKBQ EAHWM DFOQM IGHKD FKBPZ PKBQD RONWO QKWOC LNAEF
OFBFO SZQPN DEHAU QDRWE DRGRP KGWIS BPOUO FROBL RMDRH POYCK AR
4. Ciphertext
AWMQV ABMQV EIAEZ WVOEP MVPMA IQLOW LLWMA VWBXT IGLQK MKWVA QLMZI BQWVW NJTIK
SPWTM AACOO MABVW WVTGB PIBOW LLWMA XTIGL QKMJC BBPIB PMAWU MBQUM AKWVN CAMAC
AJGBP ZWEQV OBPMU EPMZM BPMGK IVBJM AMMVA BMXPM VPIES QVO
5. Ciphertext
TCWMO GLIJB OETKJ SOUOL FBZIT OAHHC VHPSK RPHHP BMVMD SUSOG AHFFS XJCFS GPDED
YZSMS KWVUY ITHFS PBDCU VSXHC VHPSK TMOQH JQWFV HLLBH ZITCE IUWEI TQGRG IKITI
KFZHZ VPKAR HHZIN KZISS LLFMU EOHTI TSWRT HWTIS FLBKC MOU
6. Ciphertext
JGTCC QWCMP JQRKM SQKQN YLGQV MCXTU RFLKI ZALPV VGWOV YFQCQ CXCNQ XNWYO JTQSB
OQIUU NIVEJ COPYO UVOEZ XQXTU RFLKK NQSGN BQMFI RZXQX GQJGR IAERI XAUVC WZOPW
WTWVT DDGMP YDGQJ EGQCA ZXJKR WDXYK ZOYLO PAZGQ RRTSB IQK
2